Handbook of Biometric Anti-Spoofing

@inproceedings{Marcel2014HandbookOB,
  title={Handbook of Biometric Anti-Spoofing},
  author={Sbastien Marcel and Mark S. Nixon and S. Li},
  booktitle={Advances in Computer Vision and Pattern Recognition},
  year={2014}
}
Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks. Topics and features: provides a detailed introduction to the field of biometric anti-spoofing and a thorough review of the associated literature; examines spoofing attacks against five biometric modalities, namely, fingerprints, face, iris, speaker and gait; discusses anti… 

A review of iris anti-spoofing

TLDR
The goal of this paper is to provide a comprehensive and structured overview on the work that has been carried out over the last decade in the field of iris anti-spoofing to provide biometric researchers an overall picture of the current panorama following a systematic approach.

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

TLDR
This tutorial article presents an introduction to spoofing and antispoofing research, describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofs and countermeasures, and outlines research priorities for the future.

Biometric Antispoofing Methods: A Survey in Face Recognition

TLDR
The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging field of antispoofing, with special attention to the mature and largely deployed face modality.

Provoking security: Spoofing attacks against crypto-biometric systems

TLDR
This paper presents crypto-biometric techniques, analyzing comparatively the different categories according to the main goal of the design and the methodology used in, and suggests a novel bimodal system, able to reject such kind of attacks.

A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

TLDR
The literature is reviewed and the state of the art in fingerprint antispoofing is presented, which includes several countermeasures that discriminate between live fingerprints and spoof artifacts.

A Survey on Anti-Spoofing Methods for Facial Recognition with RGB Cameras of Generic Consumer Devices

TLDR
This survey thoroughly investigates the face Presentation Attack Detection methods, that only require RGB cameras of generic consumer devices, over the past two decades and presents an attack scenario-oriented typology of the existing face PAD methods.

A SURVEY ON SMARTPHONE PROTECTING IDENTIFICATION AGAINST ATTACKS USING BIOMETRIC AUTHENTICATION SYSTEMS

TLDR
In this survey, the existing BAS techniques are explored and classified focusing on the security issues that they are used for and the corresponding solutions provided in this domain.

years of biometric research : Accomplishments , challenges , and opportunities ✩

TLDR
The significant progress that has been achieved in the field of biometric recognition in the past 50 years since Mitchell Trauring’s landmark paper is document to unlock the full potential of biometrics through inter-disciplinary research.
...

References

SHOWING 1-10 OF 101 REFERENCES

On the effectiveness of local binary patterns in face anti-spoofing

TLDR
This paper inspects the potential of texture features based on Local Binary Patterns (LBP) and their variations on three types of attacks: printed photographs, and photos and videos displayed on electronic screens of different sizes and concludes that LBP show moderate discriminability when confronted with a wide set of attack types.

Anti-spoofing in Action: Joint Operation with a Verification System

TLDR
Techniques for decision- level and score-level fusion to integrate a recognition and anti-spoofing systems are studied, using an open-source framework that handles the ternary classification problem (clients, impostors and attacks) transparently.

Face spoofing detection through partial least squares and low-level descriptors

TLDR
This paper describes an anti-spoofing solution based on a set of low-level feature descriptors capable of distinguishing between ‘live’ and ‘spoof’ images and videos, and explores both spatial and temporal information to learn distinctive characteristics between the two classes.

Robustness of multimodal biometric fusion methods against spoof attacks

Motion-based counter-measures to photo attacks in face recognition

TLDR
A publicly available PHOTO-ATTACK database is introduced, and a new technique of counter-measure solely based on foreground/background motion correlation using Optical Flow that outperforms all other algorithms achieving nearly perfect scoring with an equal-error rate of 1.52% is proposed.

Verifying liveness by multiple experts in face biometrics

TLDR
A holistic liveness detection paradigm that collaborates with standard techniques in 2D face biometrics is suggested that shows that many attacks are avertible via a combination of anti-spoofing measures.

Video-Based Face Spoofing Detection through Visual Rhythm Analysis

TLDR
This work presents a solution to video-based face spoofing to biometric systems based in the analysis of global information that is invariant to video content and takes advantage of noise signatures generated by the recaptured video to distinguish between fake and valid access.

An Analysis of Minutiae Matching Strength

TLDR
The potential security holes in a biometrics-based authentication scheme are outlined, the numerical strength of one method of fingerprint matching is quantified, then how to combat some of the remaining weaknesses are discussed.

Computationally Efficient Face Spoofing Detection with Motion Magnification

TLDR
A new approach for spoofing detection in face videos using motion magnification using Eulerian motion magnification approach, which improves the state-of-art performance, especially HOOF descriptor yielding a near perfect half total error rate.

On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals

TLDR
A new approach based on artificial, tone-like signals which provoke higher ASV scores than genuine client tests is introduced, demonstrating the importance of efforts to develop dedicated countermeasures to protect ASV systems from spoofing.
...